3d Object Recognition Using Centroidal Representation
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 2
Abstract
Abstract: Three dimensional object recognition from two-dimensional image is implemented in this work with the use of 512 different poses of the object (which is represented by an airplane or a cube or a satellite). The object is rotated in the three directions (x,y,z) by an angle of 2/8 rad. (45). Centroidal sample representation was used to represent the data extracted from the object. Also four or five variables for each object are calculated. These variables represent fast-calculated features of the object that can speed up the recognition process. These variables are scaled and position in variant representation of the object. The mathematical model that represents the object was calculated in two methods. These were the Wavelet Transform Model and the Auto regression Model
Authors and Affiliations
Anwer Subhi Abdulhussein Oleiwi
Evaluation of Intrusion Detection Schemes in Wireless Sensor Network
Abstract: Wireless Sensor Network (WSN) consists of sensor nodes, which communicate wirelessly in order to perform some specific operation. Wireless Sensor Network (WSN) is implemented in open medium environmentand the s...
Comparison and Enhancement of Digital Image by Using Canny Filter and Sobel Filter
In this research paper we have defining two different edge detection methods i.e canny edge detection and Sobel edge detection and we are also discussing some image quality parameters like PSNR, SNR, MSE, RMSE,...
Improved and Energy Efficient Olsr Protocol Using Spanning Tree in Manet
Abstract: Mobile Adhoc Network is an autonomous and decentralized network. Its topology changes dynamically and message overhead is more due to its frequent change of topology in network. For reliable transmissio...
A New Skin Color Based Face Detection Algorithm by CombiningThree Color Model Algorithms
Abstract: Human face recognition systems have gained a considerable attention during last decade due to itsvast applications in the field of computer and advantages over previous biometric methods. There are manyap...
A Survey on Secure Key Policy Attribute-Based Encryption Policy for Data Sharing Among Dynamic Groups in the Cloud
Profited from distributed computing, clients can accomplish a powerful and sparing methodology for information sharing among gathering individuals in the cloud with the characters of low support and little administration...